Professional Documents
Culture Documents
Mobile Ad Hoc Network Security (MANET) : Preethi Vishwanath San Jose State University Computer Science
Mobile Ad Hoc Network Security (MANET) : Preethi Vishwanath San Jose State University Computer Science
Definition
A "mobile ad hoc network" (MANET) is an autonomous system of mobile routers (and associated hosts) connected by wireless links --the union of which form an arbitrary graph. The routers are free to move randomly and organize themselves arbitrarily; thus, the network's wireless topology may change rapidly and unpredictably. Such a network may operate in a standalone fashion, or may be connected to the larger Internet. Sensor nodes consist of sensing, data processing, and communication components and typically form ad hoc networks. Due to a lack of infrastructure support, each node acts as a router, forwarding data packets for other nodes.
Can be classified into two Server: Contain the complete DBMS and bear primary responsibility for data broadcast and satisfying client queries. Clients: Have sufficient resources to cache portions of the database as well as storing some DBMS query and processing modules. Practical Use : Whenever a temporary network with no infra structure needed. Rescue situations: Rescue workers engaged in disaster relief investigate the extent of the damage around them and collaboratively work by sharing the information on their locations and findings. Excavations: Members of a research project team engaged in an archeological excavation collect various phenomenal data from sensors and share the obtained data with other members to streamline work.
Algorithm 1 to handle data push and data pull Adaptive broadcast scheduling algorithm
1. Two potential ways to construct a broadcast. 2. New items may be either added to the algorithm or may replace less important
data items. 3. A global network where all servers in a region know the location and power of all other servers in the region and full replication of the database is assumed. 4. Periodically, each server broadcasts its location and power level. This begins the broadcast cycle [9]. This is a soft real-time system. 5. There are deadlines for data delivery. The deadlines were used to determine which data request to service although no penalty for missing a deadline was mentioned. 6. There is a leader protocol that selects the server in a region with the greatest remaining power. 7. The leader coordinates the broadcast responsibilities of other servers in its area of influence. 8. The lead server determines which portion of a broadcast each server transmits. 9. The power level of each server drives this broadcast assignment. 10. The server with the least power transmitted the most important data items. Disadvantage
1. Initial algorithm has a potentially large communication overhead, servers with no
clients still broadcast. 2. Less popular items may be starve or be broadcast too late.
Utilizes a popularity factor (PF). The PF is a measure of the importance of a data item. The PF increases each time a request is made for a data item. The amount of time since the request was made also affects the PF. If it has been too long, the need to broadcast the item may be gone. This factor is called the Resident Latency (RL) and is system and scenario specific. The PF decreases whenever a request exceeds the RL value. The PF is used to assist in the building of relevant broadcasts and includes RL in order to make allowances for the movement of nodes. When the PF of broadcast items is high, the probability of a broadcast that serves maximum needs increases. If a server has not received any requests for a certain number of broadcasts, it will sleep rather than broadcast to an empty audience. Finally, to localize data delivery, the lead server assigns each server the amount of data to broadcast but not the items to broadcast. To deal with insufficient power levels, the servers rebroadcast the previous index and broadcast if they have insufficient power to build a new broadcast.
Disadvantages :
1. 2.
Servers can be assigned a broadcast larger than their power levels would permit. Power and bandwidth is also wasted with duplication.
SAF method
Each mobile host allocates replicas of N data items in descending order of the access frequencies. At the time of replica allocation, a mobile host may not connect to another mobile host which has an original or a replica of a data item that the host should allocate. In this case, the memory space for the replica is retained free. The replica is created when a data access to the data item succeeds or when the mobile host connects to another mobile host which has the original or the replica at a relocation period. In the SAF method, mobile hosts do not need to exchange information with each other for replica allocation. Moreover, replica relocation does not occur after each mobile host allocates all necessary replicas. Advantage allocates replicas with low overhead and low traffic. Disadvantage
Since each mobile host allocates replicas based on only the access frequencies to data items, mobile hosts with the same access characteristics allocate the same replicas. However, a mobile host can access data items or replicas held by other connected mobile hosts, and thus it is more effective to share many kinds of replicas among them.
Gives low data accessibility when many mobile hosts have the same or similar access characteristics.
DAFN method
The DAFN method eliminates the replica duplication among neighboring mobile hosts. First, this method preliminary determines the replica allocation in the same way as the SAF method. Then, if there is replica duplication of a data item between two neighboring mobile hosts, a mobile host with lower access frequency to the data item changes the replica to another replica. Since the neighboring status changes as mobile hosts move, the DAFN method is executed at every relocation period. At a relocation period, a mobile host may not connect to another mobile host which has an original or a replica of a data item that the host should allocate. In this case, the memory space for the replica is temporary filled with one of replicas that have been allocated since the previous relocation period but are not currently selected for allocation. This temporary allocated replica is chosen among the possible replicas where the access frequency to the replica (data item) is the highest among them. If there is not a possible replica to be temporary allocated, the memory space is retained free. When a data access to the data item whose replica should be allocated succeeds, the memory space is filled with the proper replica. Advantage Data accessibility is expected to be higher than that in the SAF method. Disadvantage
Does not completely eliminate replica duplication among neighboring hosts because it only executes the elimination process by scanning the network once based on the breadth first search. if the network topology changes during the execution of this method, the replica relocation cannot be done at mobile hosts over disconnected links
Both the overhead and the traffic are higher than the SAF method because at each relocation period, mobile hosts exchange information and relocate replicas.
DCG Method
The DCG method shares replicas in larger groups of mobile hosts than the DAFN method that shares replicas among neighboring hosts. In order to share replicas effectively, each group should be stable, i.e., the group is not easily divided due to changes of network topology. From this viewpoint, the DCG method creates groups of mobile hosts that are biconnected components[1] in a network. Here, a biconnected component denotes a maximum partial graph which is connected (not divided) if an arbitrary node in the graph is deleted. By grouping mobile hosts as a biconnected component, the group is not divided even if one mobile host disappears from the network or one link is disconnected in the group, and thus it is considered that the group has high stability. At a relocation period, a mobile host may not connect to another mobile host which has an original or a replica of a data item that the host should allocate. In this case, in the same way as the DAFN method, the memory space for the replica is temporary filled with another replica, and it is filled with the proper one when a data access to the corresponding data item succeeds. Advantage
Since many kinds of replicas can be shared, the data accessibility is expected to be higher.
Disadvantage
However, since the DCG method consists of three steps; (i) broadcasting host identifiers, (ii) determining the replica allocation, and (iii) notifying it to all hosts in the group, this method takes the largest time among the three methods to relocate replicas.
Query diffusion
State information only stored in the nodes where it has been sensed. For state retrieval an application broadcasts or geocasts a query specifying the requested state information State information matching the query is sent back to the application
Disadvantages
1. Danger of inconsistencies
Disadvantages
1. For partitioned networks the availability of state information is poor since each state item is stored on a single node only 2. Applications need to learn about state changes as fast as possible.
Paper 10 has derivation of few algorithms which help in taking care of this problem.
References
[1] T. Hara, ``Effective replica allocation in ad hoc networks for improving data accessibility,'' Proc. IEEE Infocom 2001, pp.1568-1576, 2001. [2] T. Hara, ``Replica allocation methods in ad hoc networks with data update,'' ACM-Kluwer Journal on Mobile Networks and Applications, Vol.8, No.4, pp.343-354, 2003. [3] T. Hara and S.K. Madria, ``Dynamic data replication schemes for mobile ad-hoc network based on aperiodic updates,'' Proc. Int'l Conf. on Database Systems for Advanced Applications (DASFAA 2004), pp.869-881, 2004. [4] T. Hara, N. Murakami, and S. Nishio: ``Replica Allocation for Correlated Data Items in Ad-Hoc Sensor Networks,'' ACM SIGMOD Record, Vol.33, No.1, pp.38-43, 2004. [5] H. Hayashi, T. Hara, and S. Nishio, ``Cache Invalidation for Updated Data in Ad Hoc Net-works,'' Proc. Int'l Conf. on Cooperative Information Systems (CoopIS'03), pp.516-535, 2003. [6] G. Cao, L. Yin, C.R. Das, ``Cooperative Cache-Based Data Access in Ad Hoc Networks,'' IEEE Computer Magagine, Vol.37, No.2, pp. 32-39, 2004. [7] L.D. Fife and L. Gruenwald, ``Research issues for data communication in mobile ad-hoc network database systems,'' ACM SIGMOD Record, Vol.32, No.2, pp.42-47, 2003. [8] G. Karumanchi, S. Muralidharan, and R. Prakash, ``Information dissemination in partitionable mobile ad hoc networks,'' Proc. Symposium on Reliable Distributed Systems (SRDS'99), pp.4-13, 1999. [9] J. Luo, J.P. Hubaux, and P. Eugster, ``PAN: Providing reliable storage in mobile ad hoc networks with probabilistic quorum systems,'' Proc. ACM MobiHoc 2003, pp.1-12, 2003. [10] K. Rothermel, C. Becker, and J. Hahner, ``Consistent update diffusion in mobile ad hoc networks,'' Technical Report 2002/04, Computer Science Department, University of Stuttgart, 2002. [11] F. Sailhan and V. Issarny, ``Cooperative caching in ad hoc networks,'' Proc. Int'l Conf. on Mobile Data Management (MDM'03), pp.13-28, 2003. [12] K. Wang and B. Li, ``Efficient and guaranteed service coverage in partitionable mobile ad-hoc networks,'' Proc. IEEE Infocom'02, Vol.2, pp.1089-1098, 2002. [13] http://www3.ietf.org/proceedings/00mar/47th-ietf-00mar-96.html